Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection

被引:14
作者
Akter, Sajeda [1 ]
Chellappan, Sriram [2 ]
Chakraborty, Tusher [1 ]
Khan, Taslim Arefin [1 ]
Rahman, Ashikur [1 ]
Al Islam, A. B. M. Alim [1 ]
机构
[1] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
[2] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
关键词
Protocols; Near field communication; Radiofrequency identification; Security; Hardware; Radio frequency; Relays; NFC; contactless payment; hardware; mobile security; embedded devices;
D O I
10.1109/TDSC.2020.3030213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A recent development emanating from RFID technology is Near Field Communication (NFC). Basically, NFC is a popular short range (<10 cm) wireless communication technology with applications in areas sensitive to security and privacy concerns such as contactless payment. Since NFC communications require very close proximity between two communicating devices (e.g., a smartcard and a terminal), it is generally believed that Man-in-the-Middle (MITM) attacks are practically infeasible here. Contrasting this belief, in this paper, we successfully establish MITM attack in NFC communications between a passive tag and an active terminal. We carefully present physical fundamentals of the attack, our engineering design, and results of successful attack implementation. Subsequently, we present the practical applicability of our MITM attack that exploits a potential vulnerability in EMV based contactless payment protocol, which arises due to separation between card authentication and transaction authorization phases. We demonstrate how an attacker can compromise the integrity of a contactless payment using a malicious MITM card, and also present multiple attack/victim scenarios to analyze different types of impacts of our attack. Further, we conduct rigorous experimental studies to analyze both hardware and practical ramifications of our attack. Finally, we propose a mechanism to detect the MITM attack based on experimental analysis that demands no additional hardware.
引用
收藏
页码:3012 / 3023
页数:12
相关论文
共 38 条
[1]   Can You Get into the Middle of Near Field Communication? [J].
Akter, Sajeda ;
Chakraborty, Tusher ;
Khan, Taslim Arefin ;
Chellappan, Sriram ;
Al Islam, A. B. M. Alim .
2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, :365-373
[2]   Towards defending eavesdropping on NFC [J].
Al Islam, A. B. M. Alim ;
Chakraborty, Tusher ;
Khan, Taslim Arefin ;
Zoraf, Mahabub ;
Hyder, Chowdhury Sayeed .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 100 :11-23
[3]  
[Anonymous], 2013, Bankrate.com
[4]  
[Anonymous], 2015, STRENGTH CARD AUTH M
[5]  
[Anonymous], 2016, EMV Contactless Specifications for Payment Systems: Book D-EMV Contactless Communication Protocol Specification
[6]  
[Anonymous], CREDIT CARD AUTHENTI
[7]  
[Anonymous], Bank agreement
[8]  
[Anonymous], Transaction authorization process
[9]  
[Anonymous], CONTACTLESS PAYMENTS
[10]  
[Anonymous], MERCHANT SERVICES AP